Abedin F, Chao K, Godwin N, Arochena H (2009) Preference ordering in agenda based multi-issue negotiation for service level agreement. In: International conference on Advanced Information Networking and Applications Workshops, 2009. WAINA’09. IEEE Press, New York, pp 19–24
Aïmeur E, Brassard G, Onana FSM (2005) Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS international conference on e-commerce, pp 25–33
Aydoğan R, Yolum P (2012) Learning opponent’s preferences for effective negotiation: an approach based on concept learning. Auton Agents Multi-Agent Syst 24(1):104–140. doi: 10.1007/s10458-010-9147-0
[+]
Abedin F, Chao K, Godwin N, Arochena H (2009) Preference ordering in agenda based multi-issue negotiation for service level agreement. In: International conference on Advanced Information Networking and Applications Workshops, 2009. WAINA’09. IEEE Press, New York, pp 19–24
Aïmeur E, Brassard G, Onana FSM (2005) Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS international conference on e-commerce, pp 25–33
Aydoğan R, Yolum P (2012) Learning opponent’s preferences for effective negotiation: an approach based on concept learning. Auton Agents Multi-Agent Syst 24(1):104–140. doi: 10.1007/s10458-010-9147-0
Bahrammirzaee A, Chohra A, Madani K (2013) An adaptive approach for decision making tactics in automated negotiation. Appl Intell. doi: 10.1007/s10489-013-0434-8
Borking J, Van Eck B, Siepel P, Bedrijf D (1999) Intelligent software agents: turning a privacy threat into a privacy protector. Registratiekamer, The Hague
Bouckaert RR, Frank E, Hall M, Kirkby R, Reutemann P, Seewald A, Scuse D (2009) Weka manual (3.7.1). http://prdownloads.sourceforge.net/weka/WekaManual-3-7-1.pdf?download
Buffett S, Spencer B (2005) Learning opponents’ preferences in multi-object automated negotiation. In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC’05. ACM, New York, pp 300–305
Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28:1030–1044
Chaum D, Fiat A, Naor M (1990) Untraceable electronic cash. In: CRYPTO’88: proceedings on advances in cryptology. Springer, New York, pp 319–327
ClaußS, Kesdogan D, Kölsch T (2005) Privacy enhancing identity management: protection against re-identification and profiling. In: DIM’05: proceedings of the 2005 workshop on digital identity management. ACM, New York, pp 84–93
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, San Diego, CA, USA, pp 303–320
Eyharabide V, Amandi A (2012) Ontology-based user profile learning. Appl Intell 36(4):857–869
Fasli M (2007) Agent technology for e-commerce. Wiley, New York
Fip A (2001) FIPA Contract Net Interaction Protocol Specification. FIPA
Fip A (2001) FIPA Iterated Contract Net Interaction Protocol Specification. FIPA
Fischer-Hübner S, Hedbom H (2008) Benefits of privacy-enhancing identity management. Asia Pac Bus Rev 10(4):36–52
Garfinkel S (2001) Database nation: the death of privacy in the 21st century. O’Reilly & Associates, Sebastopol
Gwak J, Sim K (2013) A novel method for coevolving ps-optimizing negotiation strategies using improved diversity controlling edas. Appl Intell 38(3):384–417
Hansen M, Berlich P, Camenisch J, Clau S, Pfitzmann A, Waidner M (2004) Privacy-enhancing identity management. Inf Secur Tech Rep 9(1):35–44
Hansen M, Schwartz A, Cooper A (2008) Privacy and identity management. IEEE Secur Priv 6(2):38–45
Hildebrandt M, Gutwirth S (2008) Profiling the European citizen: cross-disciplinary perspectives. Springer, Berlin
Hindriks K, Tykhonov D (2008) Opponent modelling in automated multi-issue negotiation using Bayesian learning. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems, AAMAS’08, vol 1, Richland, SC, pp 331–338. International Foundation for Autonomous Agents and Multiagent Systems
Hoffman D, Novak T, Peralta M (1999) Building consumer trust online. Commun ACM 42(4):80–85
JADE Board. Jade security guide (2005). http://jade.tilab.com
Kang J-G, Kim S, An S-Y, Oh S-Y (2012) A new approach to simultaneous localization and map building with implicit model learning using neuro evolutionary optimization. Appl Intell 36(1):242–269
Khor K-C, Ting C-Y, Phon-Amnuaisuk S (2012) A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl Intell 36(2):320–329
Kim K-J, Ahn H (2012) Simultaneous optimization of artificial neural networks for financial forecasting. Appl Intell 36(4):887–898
Korba L, Song R, Yee G (2002) Anonymous communications for mobile agents. In: Proceedings of the 4th international workshop on mobile agents for telecommunication applications, MATA’02, pp 171–181
Krause A, Horvitz E (2008) A utility-theoretic approach to privacy and personalization. In: Proceedings of the twenty-third conference on artificial intelligence (AAAI-08)
Lee J, Kim J, Moon JY (2000) What makes Internet users visit cyber stores again? Key design factors for customer loyalty. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI’00. ACM, New York, pp 305–312
Márquez-Vera C, Cano A, Romero C, Ventura S (2013) Predicting student failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data. Appl Intell 38(3):315–330
Menczer F, Street WN, Vishwakarma N, Monge AE, Jakobsson M (2002) Intellishopper: a proactive, personal, private shopping assistant. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 3, AAMAS’02, pp 1001–1008
Newman AE (2004) Cougaar developers’ guide. http://www.cougaar.org
Odlyzko A (2003) Privacy, economics, and price discrimination on the Internet. In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC’03. ACM, New York, pp 355–366
Petkovic M, Jonker W (eds) (2007) Security, privacy and trust in modern data management (Data-centric systems and applications). Springer, Berlin
Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. v0.34. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
Quillinan TB, Warnier M, Oey M, Timmer R, Brazier F (2008) Enforcing security in the agentscape middleware. In: Proceedings of the 2008 workshop on middleware security, MidSec’08. ACM, New York, pp 25–30
Rannenberg K, Royer D, Deuker A (eds) (2009) The future of identity in the information society: challenges and opportunities. Springer, Berlin
Recursion Software Inc. (2008) Voyager security guide. http://www.recursionsw.com/
Roth V, Jalali-Sohi M (2001) Concepts and architecture of a security-centric mobile agent server. In: ISADS
Serrano E, Gómez-Sanz JJ, Botia JA, Pavón J (2009) Intelligent data analysis applied to debug complex software systems. Neurocomputing 72(13–15):2785–2795
Serrano E, Quirin A, Botia J, Cordón O (2010) Debugging complex software systems by means of pathfinder networks. Inf Sci 180(5):561–583
Serrano E, Muñoz A, Botia J (2012) An approach to debug interactions in multi-agent system software tests. Inf Sci 205:38–57
Serrano E, Rovatsos M, Botia J (2012) A qualitative reputation system for multiagent systems with protocol-based communication. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems, AAMAS’12, vol 1, Richland, SC, pp 307–314. International Foundation for Autonomous Agents and Multiagent Systems
Serrano E, Rovatsos M, Botía JA (2013) Data mining agent conversations: a qualitative approach to multiagent systems analysis. Inf Sci 230(0):132–146
Shie B-E, Yu P, Tseng V (2013) Mining interesting user behavior patterns in mobile commerce environments. Appl Intell 38(3):418–435
Sierra C, Jennings NR, Noriega P, Parsons S (1997) A framework for argumentation-based negotiation. In: Singh MP, Rao AS, Wooldridge M (eds) ATAL. Lecture notes in computer science, vol 1365. Springer, Berlin, pp 177–192
Smith HJ, Milberg SJ (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Q 20:167–196
Solove D (2006) A taxonomy of privacy. Univ PA Law Rev 154(3):477
Spiekermann S (2006) Individual price discrimination—an impossibility? In: International Conference for Human-Computer Interaction (CHI’2006), workshop on privacy and personalization
Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67–82
Such JM (2011) Enhancing Privacy in Multi-agent Systems. PhD thesis, Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València
Such JM, Alberola JM, Espinosa A, García-Fornes A (2011) A Group-oriented Secure Multiagent Platform. Softw Pract Exp 41(11):1289–1302
Such JM, Espinosa A, García-Fornes A, Botti V (2011) Partial identities as a foundation for trust and reputation. Eng Appl Artif Intell 24(7):1128–1136
Such JM, Espinosa A, García-Fornes A (2013) A Survey of Privacy in Multi-agent Systems. Knowl Eng Rev. doi: 10.1017/S0269888913000180
Such JM, García-Fornes A, Espinosa A, Bellver J (2013) Magentix2: a privacy-enhancing agent platform. Eng Appl Artif Intell 26(1):96–109
TRUSTe and TNS (2009) 2009 study: Consumer attitudes about behavioral targeting
Turow J, King J, Hoofnagle C, Bleakley A, Hennessy M (2009) Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214
Ugurlu S, Erdogan N (2005) An overview of secmap secure mobile agent platform. In: Proceedings of second international workshop on safety and security in multiagent systems
van Blarkom G, Borking J, Olk J (eds) (2003) Handbook of privacy and privacy-enhancing technologies: the case of intelligent software agents. College bescherming persoonsgegevens, The Hague
Warnier M, Brazier F (2010) Anonymity services for multi-agent systems. Web Intell Agent Syst 8(2):219–232
Westin A (2003) Social and political dimensions of privacy. J Soc Issues 59(2):431–453
Wine (2009). http://www.w3.org/TR/2004/REC-owl-guide-20040210/wine.rdf
Witten IH, Frank E (1999) Data mining: practical machine learning tools and techniques with Java implementations (The Morgan Kaufmann series in data management systems), 1st edn. Morgan Kaufmann, San Mateo
Xu H, Shatz SM (2003) Adk: an agent development kit based on a formal design model for multi-agent systems. Autom Softw Eng 10:337–365
[-]